Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
1281
Health Care Professionals’ Use of Digital Technology in the Secondary Prevention of Cardiovascular Disease in Austria: Online Survey Study
Published 2025-06-01“…Quantitative survey data were analyzed using descriptive statistics, group comparison tests, and association statistics. …”
Get full text
Article -
1282
Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation
Published 2023-12-01“…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
Get full text
Article -
1283
Template recovery attack on encrypted face recognition systems with unprotected decision using synthetic faces
Published 2025-05-01“…Even without system access or training data, attackers can exploit leaked comparison scores to compromise facial privacy. …”
Get full text
Article -
1284
Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence
Published 2024-07-01“…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
Get full text
Article -
1285
Mental Health Classification Using Machine Learning with PCA and Logistics Regression Approaches for Decision Making
Published 2025-02-01“…Mental health statistics come with numerous challenges, beginning with data integrity. Ensuring data accuracy and reliability is essential, especially if these datasets are to be used for advanced analysis or research. …”
Get full text
Article -
1286
Enhancing Internet of Things security in healthcare using a blockchain-driven lightweight hashing system
Published 2025-05-01Get full text
Article -
1287
Product Engagement Detection Using Multi-Camera 3D Skeleton Reconstruction and Gaze Estimation
Published 2025-05-01Get full text
Article -
1288
Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation
Published 2024-09-01“…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
Get full text
Article -
1289
Standardized patient profile review using large language models for case adjudication in observational research
Published 2025-01-01“…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
Get full text
Article -
1290
Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study
Published 2025-01-01“…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
Get full text
Article -
1291
CogTrack: A Proof of Concept for Cognition Tracker
Published 2024-01-01“…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
Get full text
Article -
1292
Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing
Published 2025-01-01“…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
Get full text
Article -
1293
Client aware adaptive federated learning using UCB-based reinforcement for people re-identification
Published 2025-05-01“…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
Get full text
Article -
1294
Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method
Published 2019-05-01“…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
Get full text
Article -
1295
A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation
Published 2025-12-01“…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
Get full text
Article -
1296
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01“… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
Get full text
Article -
1297
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
Published 2025-07-01“…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
Get full text
Article -
1298
Machine Learning for Human Activity Recognition: State-of-the-Art Techniques and Emerging Trends
Published 2025-03-01Get full text
Article -
1299
GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor
Published 2025-01-01“…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
Get full text
Article -
1300
Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform.
Published 2025-01-01“…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
Get full text
Article